A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). The device embedded Chromium-based browser is launched as root with the “--no-sandbox” option. Attackers can add arbitrary JavaScript code inside “Operation” graphics and successfully exploit any number of publicly known vulnerabilities against the version of the embedded Chromium-based browser.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
siemens desigo pxm30-1 firmware |
||
siemens desigo pxm30.e firmware |
||
siemens desigo pxm40-1 firmware |
||
siemens desigo pxm40.e firmware |
||
siemens desigo pxm50-1 firmware |
||
siemens desigo pxm50.e firmware |
||
siemens pxg3.w100-1 firmware |
||
siemens pxg3.w100-2 firmware |
||
siemens pxg3.w200-1 firmware |
||
siemens pxg3.w200-2 firmware |